PORTLAND, Ore.--(BUSINESS WIRE)--
Computing Group (TCG) members will provide attendees of the Trusted
Computing Conference, Sept. 9-12, with a look at the billions of
trusted endpoints and fresh ways to use available TCG technologies to
solve emerging and current security problems.
TCG president Joerg Borchert, Infineon, will provide the keynote “Beyond
One Billion Endpoints - A Short History of IT Security's Most Important
Concept.” Borchert will talk about the many endpoints protected with TCG
standards, then discuss new developments to match the ever-increasing
speed and kinds of attacks. Users will hear about Trusted Computing in
action and how TCG works with governments and standards groups worldwide.
Steve Hanna, Juniper Networks and co-chair of TCG’s Trusted Network
Connect (TNC) Work Group, will discuss “Practical Security Automation
With Open Standards.” His talk will address how current and emerging
security automation standards and architectures from TCG and IETF are
being used to build automated defense systems and learn what’s coming
Lisa Lorenzin, Juniper Networks and TCG TNC Work Group, will present
“Compliant and Connected: Building Herd Immunity in Our Networks.”
Lorenzin will explain how TCG offers a framework for multi-vendor,
interoperable endpoint health and state reports to determine the
compliance status of any type of endpoint.
Wondering about securing the growing body of non-PC connected devices?
The panel “The Wild Wild Worldwide Web: Securing the Growing Internet of
Things” will provide some answers. Josef Allen, United States Air Force,
will join security Analyst Victor Wheatman and TCG invited expert, and
Stacy Cannady, Cisco, to look at the growing threats to the many
Internet-connected devices that are vulnerable to attacks and malware.
Other sessions will address SEDs, the TPM and the evolution of Trusted
The Trusted Computing Conference, to be held Sept. 9-12 in Orlando,
Fla., brings together experts in the field of information security to
discuss, explore, promote and emphasize the critical need for a
standards-based approach. The industry’s leading individuals and
businesses will participate in this three-day conference and trade show
that will unify the standards-based trusted computing message and
explore its practical uses. TCG is a Diamond Sponsor of the event. A
complete agenda can be found at http://trustedcomputingconference.com.
Trusted Computing Group develops, defines and promotes open,
vendor-neutral, global industry standards based on a hardware root of
trust, for interoperable trusted computing platforms. Billions of
endpoints use TCG standards to ensure system integrity, protect networks
and secure data. For more information, see www.trustedcomputinggroup.org
and on Twitter&index=5&md5=fd3e91eb6bfff0ba836a66b8b4b2a335">Twitter
Brands and trademarks are the property of their respective owners.
Tweet this: @TrustedComputin members to talk future, using standards for
security TCC @TCC2013tcc, http://bit.ly/15ltVrh
PR Works, Inc.
Anne Price, 602-840-6495
Source: Trusted Computing Group